Journal of Guangxi Normal University(Natural Science Edition) ›› 2020, Vol. 38 ›› Issue (2): 1-7.doi: 10.16088/j.issn.1001-6600.2020.02.001
WANG Han1,2, WANG Xu’an1,2*, ZHOU Neng1,2, LIU Yudong1,2
CLC Number:
[1] ARMBRUST M, FOX A, GRIFFITH R,et al. A view of cloud computing[J]. Commun ACM, 2010, 53(4): 50-58. [2] CAI H, XU B, JIANG L. Vasilakos AV IoT-based big data storage systems in cloud computing: per-spectives and challenges[J]. IEEE Internet of Things Journal, 2017, 4(1): 75-87. [3] NACHIAPPAN R, JAVADI B, CALHEIROS R, et al. Cloud storage reliability for big data applications: a state of the art survey[J]. Journal of Network and Computer Applications, 2017, 97: 35-47. [4] ATENIESE G, BURNS R, CURTMOLA R, et al. Provable data possession at untrusted stores[C]// Proceedings of the 14th ACM Conference on Computer and Communications Security. New York, NY:ACM, 2007: 598-609. [5] YU Y, AU M H, ATENIESE G, et al. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage[J]. IEEE Transactions on Information Forensics and Security, 2017, 12(4): 767-778. [6] CHEN F, XIANG T, YANG Y, et al. Secure cloud storage hits distributed string equality checking: More efficient, conceptually simpler, and provably secure[C]//2015 IEEE Conference on Computer Communications. Piscataway, NJ:IEEE Press, 2015: 2389-2397. [7] WANG B, LI B, LI H. Oruta: privacy-preserving public auditing for shared data in the cloud[J]. IEEE Transactions on Cloud Computing, 2014, 2(1): 43-56. [8] LIU X, ZHANG Y, WANG B, et al. Mona: secure multi-owner data sharing for dynamic groups in the cloud[J]. IEEE Transactions on Parallel and Distributed Systems, 2013, 24(6): 1182-1191. [9] TIAN H, NAN F L, JIANG H, et al. Public auditing for shared cloud data with efficient and secure group management[J]. Information Sciences, 2019, 472: 107-125. [10]NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL].(2009-03-25)[2019-10-08]. https://bitcoin.org/bitcoin.pdf. [11]NARAYANAN A, BONNEAU J, FELTEN E, et al. Bitcoin and cryptocurrency technologies[M]. Princeton, NJ: Princeton University Press, 2016. [12]STANEK J, KENCL L. Enhanced secure thresholded data deduplication scheme for cloud storage[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(4):694-707. [13]BHASKARAN K, ILFRICH P, LIFFMAN D, et al. Double-blind consent-driven data sharing on block-chain[C]// IEEE International Conference on Cloud Engineering. Piscataway, NJ:IEEE Press, 2018: 385-391. [14]ZHENG B K, ZHU L H, SHEN M, et al, Scalable and privacy-preserving data sharing based on block-chain[J]. Journal of Computer Science and Technology, 2018, 33(3): 557-567. [15]HUANG L, ZHANG G, YU S, et al. SeShare: Secure cloud data sharing based on blockchain and public auditing[J]. Concurrency and Computation: Practice and Experience, 2019, 31(22): e4359. [16]QI Y, TANG X, HUANG Y. Enabling efficient verification of dynamic data possession and batch up-dating in cloud storage[J]. KSII Transactions on Internet and Information Systems, 2018,12(6): 2429-2449. [17]WANG Q, WANG C, REN K, et al. Enabling public auditability and data dynamics for storage security in cloud computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2011,22 (5): 847-859. |
[1] | CHEN Xiong, ZHU Yu, FENG Ke, YU Tongwei. Identity Authentication of Power System Safetyand Stability Control Terminals Based on Blockchain [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 8-18. |
[2] | GE Lina, LIU Jinhui. Privacy Preserving Method Based on k-isomorphism and Local Randomization [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(4): 1-8. |
|